ISO/IEC 27036-3:2013
Information technology.Security techniques.Information security for supplier relationships.Part 3: Guidelines for information and communication technology supply chain security

Standard No.
ISO/IEC 27036-3:2013
Release Date
2013
Published By
International Organization for Standardization (ISO)
Status
 2023-06
Replace By
ISO/IEC 27036-3:2023
Latest
ISO/IEC 27036-3:2023
Scope
This part of ISO/IEC 27036 provides product and service acquirers and suppliers in ICT supply chain with guidance on: a) gaining visibility into and managing the information security risks caused by physically dispersed and multi-layered ICT supply chains; b) responding to risks stemming from the global ICT supply chain to ICT products and services that can have an information security impact on the organizations using these products and services. These risks can be related to organizational as well as technical aspects (e.g. insertion of malicious code or presence of the counterfeit information technology (IT) products); c) integrating information security processes and practices into the system and software lifecycle processes, described in ISO/IEC 15288 and ISO/IEC 12207, while supporting information security controls, described in ISO/IEC 27002.

ISO/IEC 27036-3:2013 Referenced Document

  • ISO/IEC 27000 Information technology - Security techniques - Information security management systems - Overview and vocabulary [Standard in French]*2018-04-01 Update
  • ISO/IEC 27036-1 Cybersecurity — Supplier relationships — Part 1: Overview and concepts*2021-09-09 Update
  • ISO/IEC 27036-2 Cybersecurity — Supplier relationships — Part 2: Requirements*2022-06-15 Update

ISO/IEC 27036-3:2013 history

  • 2023 ISO/IEC 27036-3:2023 Cybersecurity — Supplier relationships — Part 3: Guidelines for hardware, software, and services supply chain security
  • 2013 ISO/IEC 27036-3:2013 Information technology.Security techniques.Information security for supplier relationships.Part 3: Guidelines for information and communication technology supply chain security
Information technology.Security techniques.Information security for supplier relationships.Part 3: Guidelines for information and communication technology supply chain security



Copyright ©2024 All Rights Reserved